|
|
libcats.org
Главная →
Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROIComplete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROIDebra S. HerrmannWhile it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization’s mission, industry, and size will affect the nature and scope of the task as well as the metrics and combinations of metrics appropriate to accomplish it. Finding the correct formula for a specific scenario calls for a clear concise guide with which to navigate this sea of information.
Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI defines more than 900 ready to use metrics that measure compliance, resiliency, and return on investment. The author explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including Sarbanes-Oxley, HIPAA, and the Data Protection Act-UK. The metrics covered are scaled by information sensitivity, asset criticality, and risk, and aligned to correspond with different lateral and hierarchical functions within an organization. They are flexible in terms of measurement boundaries and can be implemented individually or in combination to assess a single security control, system, network, region, or the entire enterprise at any point in the security engineering lifecycle. The text includes numerous examples and sample reports to illustrate these concepts and stresses a complete assessment by evaluating the interaction and interdependence between physical, personnel, IT, and operational security controls. Bringing a wealth of complex information into comprehensible focus, this book is ideal for corporate officers, security managers, internal and independent auditors, and system developers and integrators.
Популярные книги за неделю:
Проектирование и строительство. Дом, квартира, садАвтор: Петер Нойферт, Автор: Людвиг Нефф
Размер книги: 20.83 Mb
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Радиолюбительские схемы на ИС типа 555Автор: Трейстер Р.Категория: Электротехника и связь
Размер книги: 13.64 Mb
Только что пользователи скачали эти книги:
The Principle of Legality in International and Comparative Criminal Law (Cambridge Studies in International and Comparative Law)Автор: Kenneth S. Gallant
Размер книги: 4.45 Mb
Symbolic Interaction and Cultural StudiesАвтор: Howard S. Becker, Автор: Michal M. McCall
Размер книги: 12.40 Mb
Beyond Conventional Wisdom in Development Policy: An Intellectual History of UNCTAD 1964-2004Автор: United Nations
Размер книги: 22.40 Mb
The Internationalisation of Mobile Telecommunications: Strategic Challenges in a Global MarketАвтор: Peter Curwen, Автор: Jason Whalley
Размер книги: 4.73 Mb
Искатель. 2009. Выпуск №1Автор: Гилберт Майкл. Дж, Автор: Благов Владимир, Автор: Федоров Михаил, Автор: Герасимов АнатолийКатегория: Научная Фантастика
Размер книги: 1.05 Mb
Strategies of Genius Vol III Chapter 1 of 3 - Sigmund FreudАвтор: Dilts RobertКатегория: fiction
Размер книги: 3.11 Mb
|
|
|